Date Author Title

KILL CHAIN

2016-11-23Tom WebbMapping Attack Methodology to Controls

KILL

2017-12-27/a>Guy BruneauWhat are your Security Challenges for 2018?
2017-05-13/a>Guy BruneauHas anyone Tested WannaCry Killswitch? - https://blog.didierstevens.com/2017/05/13/quickpost-wcry-killswitch-check-is-not-proxy-aware/
2016-11-23/a>Tom WebbMapping Attack Methodology to Controls
2016-01-05/a>Guy BruneauWhat are you Concerned the Most in 2016?
2011-08-30/a>Johannes UllrichApache patch out for "byte range" DoS vulnerability http://www.apache.org/dist/httpd/Announcement2.2.html
2011-08-25/a>Kevin ShorttRevival of an Unpatched Apache HTTPD DoS
2009-07-13/a>Adrien de BeaupreVulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution
2008-08-15/a>Jim ClausingAnother MS update that may have escaped notice
2008-07-07/a>Scott FendleyMicrosoft Snapshot Viewer Security Advisory
2006-09-30/a>Robert Danford*WebViewFolderIcon ActiveX control exploit(s) in the wild
2006-09-28/a>Tom ListonSetslice Killbit Apps

CHAIN

2024-07-16/a>Jan Kopriva"Reply-chain phishing" with a twist
2023-07-18/a>Johannes UllrichExploit Attempts for "Stagil navigation for Jira Menus & Themes" CVE-2023-26255 and CVE-2023-26256
2022-09-19/a>Russ McReeChainsaw: Hunt, search, and extract event log records
2019-10-24/a>Johannes UllrichYour Supply Chain Doesn't End At Receiving: How Do You Decommission Network Equipment?
2017-06-02/a>Xavier MertensPhishing Campaigns Follow Trends
2016-11-23/a>Tom WebbMapping Attack Methodology to Controls